Interlink Networks Information for VU#589523
Multiple implementations of the RADIUS protocol contain a digest calculation buffer overflow
- Vendor Information Help Date Notified: 30 Jan 2002
- Statement Date:
- Date Updated: 18 Mar 2002
Interlink Networks has inspected and tested all released versions of its RADIUS server for susceptibility to the issues described in VU#936683 and VU#589523. NONE of Interlink Networks products are susceptible to the vulnerabilities outlined in the advisory.
Interlink Networks also inspected and tested Merit RADIUS server version 3.6B2 and found that it is NOT vulnerable to the reported issues.
The vendor has not provided us with any further information regarding this vulnerability.
Note that Interlink Networks handles the Merit AAA Server.
If you have feedback, comments, or additional information about this vulnerability, please send us email.